CVE Vulnerabilities

CVE-2023-41842

Use of Externally-Controlled Format String

Published: Mar 12, 2024 | Modified: Jul 11, 2025
CVSS 3.x
6.7
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiManager version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer-BigData before 7.2.5 and Fortinet FortiPortal version 6.0 all versions and version 5.3 all versions allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

Name Vendor Start Version End Version
Fortianalyzer Fortinet 6.2.0 (including) 7.0.10 (excluding)
Fortianalyzer Fortinet 7.2.0 (including) 7.2.4 (excluding)
Fortianalyzer Fortinet 7.4.0 (including) 7.4.2 (excluding)
Fortianalyzer_big_data Fortinet 6.4.5 (including) 6.4.7 (including)
Fortianalyzer_big_data Fortinet 7.0.1 (including) 7.0.6 (including)
Fortianalyzer_big_data Fortinet 7.2.0 (including) 7.2.6 (excluding)
Fortianalyzer_big_data Fortinet 6.2.5 (including) 6.2.5 (including)
Fortimanager Fortinet 6.2.0 (including) 7.0.10 (excluding)
Fortimanager Fortinet 7.2.0 (including) 7.2.4 (excluding)
Fortimanager Fortinet 7.4.0 (including) 7.4.2 (excluding)
Fortiportal Fortinet 5.3.0 (including) 6.0.15 (excluding)

Potential Mitigations

References